US 6578086 Dynamically managing the topology of a data network

ABSTRACT – A network device is presented comprising a filtering database, a link state database and a controller, coupled to each of the filtering database and the link state database, to process data received from remote network devices based, at least in part, on distance vector information stored in the filtering database, link state information stored in the link state database, and content of the received data.

FIELD

The present invention relates to the field of networking and,in particular, to a method and apparatus for dynamically managing the topology of a data network.

BACKGROUND

As computer technology has evolved, so too has the use of data networks to communicatively couple computer systems together, enabling them to communicate with one another. Data networks come in many different sizes and network topologies. From small peer-to-peer networks enabling multiple users of a small office to share data, to more formal local area networks (LAN), wide-area and global data networks (e.g., the Internet). Those skilled in the art will appreciate that the management of such data networks has become a mission critical function for many enterprises.

One commonly used measure of network performance and manageability is the time required by network core devices to identify optimal routing paths (or, re-routing in the event of failure) between network elements, a measure colloquially referred to as a network’s “convergence time”. Those skilled in the art will appreciate that convergence is not an easy task, as there often exists a number of alternate paths to each network element, often resulting in undesirable physical loops. Accordingly, many network devices utilize routing protocols with convergence algorithms that are designed to identify and eliminate unwanted physical loops. The complexity of the routing protocol and, consequently, the convergence algorithm is often dictated by the processing power of the network devices populating the network and the network layer of interest.

The processing power of network devices varies between devices and, quite often, on which “layer” of the network the device is to operate. Those skilled in the art will appreciate that use of the term “network layer” refers to the layers defined in the Open System Interconnection (OSI) network model. Routers operating at the network layer (layer 3), for example, are typically configured with more processing power and memory than bridges (or switches, which are really just multiport bridges) operating at the link or Media Access Control (MAC) layer (layer 2). Accordingly, the protocols employed by network devices vary depending upon which network layer is being discussed.

In general, there are two types of convergence protocols: link state protocols and distance vector protocols. Link state protocols are typically used by routers in layer 3 of the network to identify optimal network routing paths by flooding routing information to all of the network devices resident within that layer of the data network. In accordance with the link state protocol, each network device sends only that portion of the routing table that describes the state of its own links. One popular example of a link state protocol is the Open Shortest Path First (OSPF) protocol developed and standardized by the Internet Engineering Task Force (IETF).

In contrast, distance vector algorithms are typically utilized by bridges to identify the optimal network routing paths at the link layer (e.g., layer 2) of the OSI network model. A popular prior art distance vector algorithm utilized in layer 2 convergence protocols is the Spanning Tree Protocol (STP), developed by Radia Perlman and standardized in IEEE 801.2d. STP is a protocol designed to allow bridges to map a network topology (e.g., the active topology) while eliminating loops which could lead to broadcast storms essentially crippling network performance. Those skilled in the art will appreciate, however, that as network traffic has increased, the popularity of the STP as a network management protocol has diminished due to the inherent latency required to establish new routing paths once a fault has been detected. In some instances, it may take several minutes to reconnect a network device that has been isolated due to a fault in the network. Due to the relatively lengthy convergence times associated with STP, networking administrators have been pressuring device manufacturers for an improved layer 2 networking device that reduces or eliminates the reliance on distance vector algorithms to control the network topology of a data network.

Several solutions have been proposed and implemented in switching products by various vendors, most of which come in the form of a proprietary enhancement to the STP standard protocol. One example of just such a solution is the UplinkFast™ technology from Cisco Systems Inc. of San Jose, Calif. The Spanning Tree UplinkFast™ protocol is designed to improve convergence time, while still adhering to the basic STP standard. Simplistically, the UplinkFast™ solution creates virtual groups of ports into uplink groups wherein the STP configures ports an uplink group at a time. One of the limitations of the UplinkFast™ solution, however, is that it physically turns links off when potential loops are identified. Those skilled in the art will appreciate that turning off a link, as done in the UplinkFast™ solution, eliminates the possibility for redundancy, thereby increasing the convergence time should a link fail. In addition, although the UplinkFast™ approach has, indeed, reduced the time required for basic STP convergence, it is an incremental improvement at best.

Another drawback of the STP is its inability to accommodate load balancing, and other more advanced network services such as Quality of Service (QoS). That is, insofar as the STP establishes an active topology void of redundant paths and loops, it forecloses any opportunity for load sharing among multiple links leading to the same point insofar as those multiple links may well represent a broadcast loop. To date, this limitation of the distance vector protocols have not been addressed by device manufacturers.

Thus, it would be desirable to provide an innovative solution that improves convergence time while providing for load sharing and other advanced network services, without negatively affecting network reliability attributes. More specifically, a method and apparatus for dynamically managing the topology of a data network that is unencumbered by the inherent deficiencies and limitations commonly associated with the spanning tree protocol and other prior art solutions.

SUMMARY

In accordance with the teachings of the present invention, a method and apparatus for dynamically managing the topology of a data network is provided. In particular, in accordance with one embodiment of the present invention, the apparatus comprises a filtering database, a link-state database, and a controller. Coupled to each of the filtering database and the link-state database, the controller processes data received from remote network devices based, at least in part, on distance vector information stored in the filtering database, link state information stored in the link state database, and content of the received data.

Other aspects and features of the present invention will become apparent to those ordinarily skilled in the art upon review of the following description of specific embodiments of the invention in conjunction with accompanying figures.

Related Posts

US 5377186 System for providing enhanced subscriber services using ISUP call-setup protocol ABSTRACT – A system and method for retrieving enhanced subscriber services from at least one database and delivering those services to the subscribers of a telecommunications network without requiring the expensive upgrading of local switches (LSs) to operate with the Transaction Capabilities Application Part/Advanced Intelligent Network (TCAP/AIN) communications protocol. The system comprises a plurality of LSs which are connected to an Advanced Intelligent Network (AIN) and provide the subscribers with access to the network. The system also includes at least one virtual service switching point (ViSSP) within the AIN for storing the database of enhanced subscriber services. LSs or tandem switches may retrieve enhanced subscriber services from the ViSSP utilizing the Integrated Services Digital Network User Part (ISUP) call-setup protocol. FIELD OF THE INVENTION This invention relates to telephone switching and, more particularly, to a telecommunications system having local…

US 5280583 System and method for performing interlocution at a plurality of terminals connected to communication network ABSTRACT – A plurality of work stations each imparted with a multi-window control function are interconnected through an integrated service digital network (ISDN), wherein control communication route is established among a plurality of stations between which interlocutory communication are to be performed. The work stations transfer control commands by way of the control communication route in accordance with operation by users under the control of an interlocution control program to thereby establish or disconnect a logical communication route between designated application programs of the work stations. So long as the logical communication route is established, the application programs can execute data processing in cooperation with each other. In that case, identical change of display in the windows corresponding to the application programs, respectively, takes place in the work stations. User can perform conference or…

US 6757717 System and method for data access ABSTRACT – The invention provides a system for data access in a packet-switched network, including a sender/computer including an operating unit, a first memory, a permanent storage memory and a processor and a remote receiver/computer including an operating unit, a first memory, a permanent storage memory and a processor, the sender/computer and the receiver/computer communicating through the network; the sender/computer further including device for calculating digital digests on data; the receiver/computer further including a network cache memory and device for calculating digital digests on data in the network cache memory; and the receiver/computer and/or the sender/computer including device for comparison between digital digests. The invention also provides a method and apparatus for increased data access in a packet-switched network. FIELD OF THE INVENTION The present invention relates to data access in networks. Specifically, the invention is concerned with a method, system and apparatus…

US 7237012 Method and apparatus for classifying Java remote method invocation transport traffic ABSTRACT – A data communication network for DiffServ communications includes a customized Java socket factory added to clients connected to a data communication network having a DiffServ-enabled edge router. When an application running on a client system wishes to make a remote procedure call to a remote server system on another network, it makes a call to an RMI stub which invokes an RMI transport layer having the custom socket factory to generate a socket used in the RMI call. The custom socket factory detects when a high priority RMI call is being made and can determine the identity of the calling procedure as well. The socket factory makes a side channel communication to the edge router to provide this information to the edge router, which then makes use of this data when performing DiffServ classification for…

US6 6810389 System and method for flexible packaging of software application licenses ABSTRACT – A method for providing licenses to client computer systems to allow the client computer systems to use licensed software products includes receiving a request for a feature license for a feature included in a package, filtering the request based on whether the license requires the checkout of a parent license, granting a package license to the client computer system when the client computer system is allowed to receive the package license according to a license policy and denying the package license to the client computer system when the client computer system is not allowed to receive the package license according to the license policy. The request may include checkout data that includes at least one desired feature attribute. A software license server for providing licenses to client computer systems to allow the client computer systems to…

US 6151632 Method and apparatus for distributed transmission of real-time multimedia information ABSTRACT – A method and apparatus for delivering real-time multimedia information to clients via a distributed network is provided. The method and apparatus includes a LiveStation for encoding the real-time multimedia information into a number of different bandwidth points, and associated indexes, each bandwidth point for transmission over data channels of a particular bandwidth. The bandwidth points and indexes are provided to a recaster server to push the bandwidth points and indexes in parallel to secondary servers. The secondary servers then provide clients with compressed multimedia information according to the type of data channel used for connection. Parallel transmission of multiple bandwidth points and indexes allows the secondary servers to dynamically switch bandwidth points if data channels to clients change during transmission. Protocol between the LiveStation and a Recaster server, and between Recaster servers and secondary servers, is provided…

US 20070169171 Technique for authenticating network users ABSTRACT – A technique for authenticating network users is disclosed. In one particular exemplary embodiment, the technique may be realized as a method for authenticating network users. The method may comprise receiving, from a client device, a request for connection to a network. The method may also comprise evaluating a security context associated with the requested connection. The method may further comprise assigning the client device one or more access privileges based at least in part on the evaluation of the security context. FIELD OF THE DISCLOSURE The present disclosure relates generally to network security and, more particularly, to a technique for authenticating network users. BACKGROUND OF THE DISCLOSURE To prevent unauthorized access, it is often necessary for a network to authenticate its users to ensure that each user is who he or she claims to be. Conventional user authentication methods typically involve a…

US 7580349 Content-aware dynamic network resource allocation ABSTRACT – Network resources allocated for particular application traffic are aware of the characteristics of L4+ content to be transmitted. One embodiment of the invention realizes network resource allocation in terms of three intelligent modules, gateway, provisioning and classification. A gateway module exerts network control functions in response to application requests for network resources. The network control functions include traffic path setup, bandwidth allocation and so on. Characteristics of the content are also specified in the received application network resource requests. Under request of the gateway module, a provisioning module allocates network resources such as bandwidth in optical networks and edge devices as well. An optical network resource allocation leads to a provisioning optical route. Under request of the gateway module, a classification module differentiates applications traffic according to content specifications, and thus creates and applies content-aware rule data for edge devices to forward…

US 6778653 Storing information about a telephony session Abstract ABSTRACT – A communications system includes nodes and terminals capable of being involved in a telephony session. Telephony cookies may be created in telephony sessions between a calling terminal and a called terminal. The telephony cookies may be created by the called terminal and sent to the calling terminal for storage. Contents of the telephony cookie may include identifiers of the calling terminal and the called terminal. Other contents may include the date and time the cookie was created, expiration data and time of the cookie, and a data field that can store other types of information relating to telephony sessions. BACKGROUND The invention relates to storing information about telephony sessions. Data networks are widely used to link various types of nodes, such as personal computers, servers, gateways, network telephones, and so forth. Networks may include private networks, such as local area…

US 8681951 Systems and methods for visual presentation and selection of IVR menu. ABSTRACT – Embodiments of the invention provide a system for generating an Interactive Voice Response (IVR) database, the system comprising a processor and a memory coupled to the processor. The memory comprising a list of telephone numbers associated with one or more destinations implementing IVR menus, wherein the one or more destinations are grouped based on a plurality of categories of the IVR menus. Further the memory includes instructions executable by said processor for automatically communicating with the one of more destinations, and receiving at least one customization record from said at least one destination to store in the IVR database. Further, a corresponding method for generating an Interactive Voice Response (IVR) database is also provided. FIELD OF THE INVENTION The invention relates to Interactive Voice Response (IVR) system and more specifically the invention relates to visual…

US 7027411 Method and system for identifying and processing changes to a network topology ABSTRACT – A method and system are disclosed for mapping the topology of a network having interconnected nodes by identifying changes in the network and updating a stored network topology based on the changes. The nodal connections are represented by data tuples that store information such as a host identifier, a connector interface, and a port specification for each connection. A topology database stores an existing topology of a network. A topology converter accesses the topology database and converts the existing topology into a list of current tuples. A connection calculator calculates tuples to represent connections in the new topology. The topology converter receives the new tuples, identifies changes to the topology, and updates the topology database using the new tuples. The topology converter identifies duplicate tuples that appear in both the new tuples and the…

US 6842781 Download and processing of a network management application on a network device ABSTRACT – A method and system is provided for performing a network management task on a network device. The network device loads a network management application capable of performing the network management task onto the network device in response to a request. Loading may include accessing an application server having the network management application capable of a performing the network management task and downloading the network management application over a network from the application server to the network device. The network device then executes the network management application corresponding to the requested network management task. Methods and systems provide a result from executing the network management application to a network management system used to manage the network. TECHNICAL FIELD This invention generally relates to network management and, more particularly, to a method and apparatus for accessing…

US 8880120 Device and method for providing enhanced telephony ABSTRACT – Embodiments of the invention provide a communication system including a processor and a memory coupled to the processor. The memory includes instructions executable by processor to communicate with a database comprising a plurality of visual integrated voice response (IVR) menus associated with a plurality of destinations. Further, the instructions executable by the processor for receiving a dialed phone number of a destination. Furthermore, the instructions executable by the processor for comparing the dialed phone number with phone numbers stored in the database. Additionally, the instructions executable by the processor for transferring to be displayed a form based on the comparison. Herein, the form comprises one or more data request fields corresponding to a visual IVR menu associated with the dialed destination. FIELD OF THE INVENTION The invention relates to Interactive Voice Response (IVR) system and more specifically the invention…

US 8000454 Systems and methods for visual presentation and selection of IVR menu ABSTRACT – Embodiments of the invention provide a system for generating an Interactive Voice Response (IVR) database. The system comprises a memory having a list of telephone numbers associated with destinations implementing IVR. The destinations are grouped based on multiple categories of IVR. Moreover, the memory comprises instructions for automatically communicating with multiple IVR and instructions for downloading customization record from said multiple IVR. The system further comprises a processor that executes instructions stored in the memory. FIELD OF THE INVENTION The invention relates to Interactive Voice Response (IVR) system and more specifically the invention relates to visual selection of IVR option from a caller device. BACKGROUND OF THE INVENTION Interactive Voice Response (IVR) technology is generally used to detect voice and key inputs from a caller. Various organizations such as banks, insurance companies, and other service…

US 6976054 Method and system for accessing low-level resources in a network device ABSTRACT – A method and system provide access to information about a resource associated with a network device. The method and system selects a layer for communicating with the requested resource associated with the network device in a network protocol stack having multiple layers, establishes an inner layer socket for communicating at the selected layer using an inner layer application programming interface (IL API) and a socket identifier associated with the requested resource, wherein the inner layer socket communicates using the selected layer and bypasses other layers in the network protocol stack, transmits the request for information about the resource through the inner layer socket and the socket identifier, receives the information about the resource in response to the transmission made through the inner layer socket, and passes the information about the resource through the inner layer socket…

29 Dec 2000

Search

Contact

Network Communications Expert

A scientist, a technologist and an educator with over 30 years of experience; co-authored over 25 scientific publications, journal articles, and peer-reviewed papers; named inventor of over 120 issued and filed patents. Expert in telecommunications, network communications, Internet protocols, and mobile wireless.